Search Results - buffer-overflow vulnerability detection

Refine Results
  1. 1

    BovdGFE: buffer overflow vulnerability detection based on graph feature extraction by Lv, Xinghang, Peng, Tao, Chen, Jia, Liu, Junping, Hu, Xinrong, He, Ruhan, Jiang, Minghua, Cao, Wenli

    ISSN: 0924-669X, 1573-7497
    Published: New York Springer US 01.06.2023
    “…Automatically detecting buffer overflow vulnerabilities is an important research topic in software security…”
    Get full text
    Journal Article
  2. 2

    Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation by Zhao, Xianda, Huang, Shuguang, Pan, Zulie, Hui, Huang

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.06.2020
    Published in Journal of physics. Conference series (01.06.2020)
    “… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation…”
    Get full text
    Journal Article
  3. 3

    BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis by Xu, Shenglin, Wang, Yongjun

    ISSN: 1939-0114, 1939-0122
    Published: London Hindawi 22.06.2022
    Published in Security and communication networks (22.06.2022)
    “…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems…”
    Get full text
    Journal Article
  4. 4

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes by Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Published: The Institution of Engineering and Technology 01.08.2016
    Published in IET software (01.08.2016)
    “…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution by Wang, Wenhui, Zhwng, PEngland, Wei, Guichen, Ge, Zhenwei, Qin, Zhongyuan, Sun, Xin

    Published: IEEE 18.08.2023
    “…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow vulnerability is of utmost importance…”
    Get full text
    Conference Proceeding
  7. 7

    A combinatorial approach to detecting buffer overflow vulnerabilities by Wenhua Wang, Yu Lei, Donggang Liu, Kung, D., Csallner, C., Dazhi Zhang, Kacker, R., Kuhn, R.

    ISBN: 9781424492329, 1424492327
    ISSN: 1530-0889
    Published: IEEE 01.06.2011
    “… In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities…”
    Get full text
    Conference Proceeding
  8. 8
  9. 9

    ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis by Xu, Lili, Xu, Mingjie, Li, Feng, Huo, Wei

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Singapore 08.09.2020
    Published in Cybersecurity (Singapore) (08.09.2020)
    “…The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems…”
    Get full text
    Journal Article
  10. 10

    Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities by Pasupulati, A., Coit, J., Levitt, K., Wu, S.F., Li, S.H., Kuo, J.C., Fan, K.P.

    ISBN: 0780382307, 9780780382305
    ISSN: 1542-1201
    Published: Piscataway NJ IEEE 2004
    “… In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits…”
    Get full text
    Conference Proceeding
  11. 11

    PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation by Petrean, Florin, Colesa, Adrian

    ISBN: 9798350361919
    ISSN: 1844-7872
    Published: IEEE 16.05.2024
    “…Automated detection tools play a crucial role in assisting researchers to identify and rectify existing software flaws…”
    Get full text
    Conference Proceeding
  12. 12

    Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis by Ying, Huan, Zhang, Yanmiao, Han, Lifang, Cheng, Yushi, Li, Jiyuan, Ji, Xiaoyu, Xu, Wenyuan

    Published: IEEE 01.03.2019
    “… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA…”
    Get full text
    Conference Proceeding
  13. 13

    Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects by Pereira, Jose D'Abruzzo, Ivaki, Naghmeh, Vieira, Marco

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2021
    Published in IEEE access (2021)
    “… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs…”
    Get full text
    Journal Article
  14. 14

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks by Akter, Mst Shapna, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Cuzzocrea, Alfredo

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 01.06.2023
    Published in arXiv.org (01.06.2023)
    “… open-source code containing millions of functions with potential buffer overflow exploits…”
    Get full text
    Paper
  15. 15

    What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability by Cruzes, Daniela Soares, Chaim, Marcos Lordello, Santos, Daniel Soares

    ISSN: 2640-4265, 2640-4273
    Published: Hershey IGI Global 01.07.2018
    “…Buffer overflow (BO) is a well-known and widely exploited security vulnerability…”
    Get full text
    Journal Article
  16. 16

    Static Analysis Method for Detecting Buffer Overflow Vulnerabilities by Puchkov, F. M., Shapchenko, K. A.

    ISSN: 0361-7688, 1608-3261
    Published: New York Springer Nature B.V 01.07.2005
    Published in Programming and computer software (01.07.2005)
    “…In this paper, a new static method for automated detection of vulnerabilities that could result in buffer overflows in programs is suggested…”
    Get full text
    Journal Article
  17. 17

    Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test by Li, Zesong, Yang, Hui, Ge, Junwei, Yu, Qinyong

    Published: IEEE 11.12.2020
    “… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow…”
    Get full text
    Conference Proceeding
  18. 18

    Poster: Analytical Study on Large Language Models' Detection Capability for Buffer Overflow and Integer Overflow Vulnerabilities by Cao, Xiaohong, Xie, Wanling, Zhang, Yu, Xue, Caixia, Shi, Lin, Zhang, Huajun

    ISSN: 2158-9208
    Published: IEEE 10.10.2025
    “… However, systematic investigation of LLMs for buffer and integer overflows vulnerabilityies detection remains notably lacking…”
    Get full text
    Conference Proceeding
  19. 19

    A method for detecting buffer overflow vulnerabilities by Jingbo Yuan, Shunli Ding

    ISBN: 9781612844855, 1612844855
    Published: IEEE 01.05.2011
    “… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting…”
    Get full text
    Conference Proceeding
  20. 20

    Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities by Padmanabhuni, Bindu Madhavi, Kuan Tan, Hee Beng

    Published: IEEE 01.05.2015
    “… Despite existence of many detection solutions, buffer overflow bugs are widely being reported in multitude of applications suggesting either inherent limitations in current solutions or problems…”
    Get full text
    Conference Proceeding